| Literature DB >> 35808558 |
Dmitry Levshun1, Andrey Chechulin1, Igor Kotenko1.
Abstract
Nowadays, the whole driver monitoring system can be placed inside the vehicle driver's smartphone, which introduces new security and privacy risks to the system. Because of the nature of the modern transportation systems, the consequences of the security issues in such systems can be crucial, leading to threat to human life and health. Moreover, despite the large number of security and privacy issues discovered in smartphone applications on a daily basis, there is no general approach for their automated analysis that can work in conditions that lack data and take into account specifics of the application area. Thus, this paper describes an original approach for a security and privacy analysis of driver monitoring systems based on smartphone sensors. This analysis uses white-box testing principles and aims to help developers evaluate and improve their products. The novelty of the proposed approach lies in combining various security and privacy analysis algorithms into a single automated approach for a specific area of application. Moreover, the suggested approach is modular and extensible, takes into account specific features of smartphone-based driver monitoring systems and works in conditions of lack or inaccessibility of data. The practical significance of the approach lies in the suggestions that are provided based on the conducted analysis. Those suggestions contain detected security and privacy issues and ways of their mitigation, together with limitations of the analysis due to the absence of data. It is assumed that such an approach would help developers take into account important aspects of security and privacy, thus reducing related issues in the developed products. An experimental evaluation of the approach is conducted on a car driver monitoring use case. In addition, the advantages and disadvantages of the proposed approach as well as future work directions are indicated.Entities:
Keywords: driver monitoring systems; information security; intelligent transportation systems; privacy analysis; security analysis; smartphone sensors; white-box testing
Mesh:
Year: 2022 PMID: 35808558 PMCID: PMC9269856 DOI: 10.3390/s22135063
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Approaches’ contribution.
| Object of Analysis | References | Analyzed Data | Provided Data |
|---|---|---|---|
| Functionality | [ | hardware and software elements, interfaces, data transfer protocols, data extraction, storage and transfer processes | security threats, classes of attacks |
| Configuration | [ | platforms and versions of their hardware components, firmware and operating systems, as well as software applications used by them | vulnerabilities, weaknesses, risks |
| Source code | [ | code’s architecture and logic of operation, extraction, storage or transfer of data processes, interactions between elements | detected buffer overflows, memory leaks and code inserts, compliance with privacy policy |
| Logs | [ | events | anomalies, attacks, leakage |
| Traffic | packets | ||
| Documents | [ | agreements, legal documents | current state of work with user’s private data and its compliance with legal requirements |
Figure 1Structure of the smartphone-based driver monitoring systems.
Figure 2The approach for the security and privacy analysis of smartphone-based driver monitoring systems from the developer’s point of view.
Figure 3Stage 0—Analysis of the functionality of the driver monitoring system.
Figure 4Stage 1—Detection of the possible security issues.
Figure 5Stage 2—Detection of the covered security issues.
Figure 6Stage 3—Analysis of the actual state of work with the user’s data.
Figure 7Stage 4—Analysis of the requirement to work with the user’s data.
Figure 8Stage 5—Analysis of the user’s permissions to work with private data.
Figure 9Stage 6—Suggestion of the security measures.
Figure 10Stage 7—Suggestion of the privacy measures.
Figure 11Stage 8—Evaluation of the analysis quality.
Weighted values of the input data importance.
| Issue | Stage | Input | Stage Value | Approach Value |
|---|---|---|---|---|
|
| 1 |
| 0.50 | 0.50 |
|
| 0.30 | |||
|
| 0.20 | |||
| 2 |
| 0.20 | 0.10 | |
|
| 0.80 | |||
|
| 3 |
| 0.10 | 0.20 |
|
| 0.50 | |||
|
| 0.20 | |||
|
| 0.20 | |||
| 4 |
| 1.00 | 0.10 | |
| 5 |
| 0.70 | 0.10 | |
|
| 0.30 |
Android 8 vulnerabilities.
| 2017 | 2018 | 2019 | 2020 | 2021 | Total | |
|---|---|---|---|---|---|---|
| Denial of service | 9 | 21 | 2 | 7 | 1 | 40 |
| Code execution | 20 | 43 | 38 | 43 | 3 | 147 |
| Overflow | 14 | 12 | 9 | 32 | 2 | 69 |
| Memory corruption | 0 | 1 | 11 | 4 | 1 | 17 |
| SQL injection | 0 | 1 | 3 | 5 | 0 | 9 |
| Cross site scripting | 0 | 1 | 0 | 0 | 0 | 1 |
| Directory traversal | 0 | 2 | 0 | 3 | 0 | 5 |
| Bypass | 0 | 11 | 12 | 35 | 4 | 62 |
| Gain information | 21 | 27 | 7 | 32 | 0 | 87 |
| Gain privileges | 0 | 0 | 1 | 3 | 1 | 5 |
Samsung’s vulnerabilities.
| 2017 | 2018 | 2019 | 2020 | 2021 | Total | |
|---|---|---|---|---|---|---|
| Denial of service | 5 | 0 | 0 | 1 | 3 | 9 |
| Code execution | 3 | 13 | 1 | 1 | 6 | 24 |
| Overflow | 1 | 4 | 1 | 1 | 7 | 14 |
| Memory corruption | 0 | 1 | 0 | 0 | 0 | 1 |
| Cross site scripting | 1 | 3 | 4 | 0 | 1 | 9 |
| Directory traversal | 2 | 1 | 0 | 0 | 1 | 4 |
| Bypass | 2 | 0 | 0 | 0 | 2 | 4 |
| Gain information | 11 | 2 | 0 | 0 | 4 | 17 |
| Gain privileges | 2 | 0 | 0 | 1 | 0 | 3 |
| Cross site request forgery | 0 | 1 | 0 | 0 | 0 | 1 |
Approaches’ comparison.
| Approach | Input Data | Output Data | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
| Functionality [ | + | + | – | – | – | – | – | – | – | + | – | + | – | – | – |
| Configuration [ | – | + | – | – | + | – | – | + | – | + | – | + | – | – | – |
| Source code [ | – | – | – | + | + | – | – | – | – | + | + | + | + | – | – |
| Logs, traffic [ | – | – | – | – | – | + | – | – | – | + | + | – | – | – | + |
| – | – | – | – | – | – | + | – | – | + | + | – | – | – | + | |
| Documents [ | – | – | + | + | – | – | – | – | + | – | + | – | + | – | + |
| Developed | + | + | + | + | + | + | + | + | + | + | + | + | + | + | + |